Jurnal Teknik Informatika (JUTIF)
Jurnal Teknik Informatika (JUTIF) is an Indonesian national journal, publishes high-quality research papers in the broad field of Informatics, Information Systems and Computer Science, which encompasses software engineering, information system development, computer systems, computer network, algorithms and computation, and social impact of information and telecommunication technology. Jurnal Teknik Informatika (JUTIF) is published by Informatics Department, Universitas Jenderal Soedirman twice a year, in June and December. All submissions are double-blind reviewed by peer reviewers. All papers must be submitted in BAHASA INDONESIA. JUTIF has P-ISSN : 2723-3863 and E-ISSN : 2723-3871. The journal accepts scientific research articles, review articles, and final project reports from the following fields : Computer systems organization : Computer architecture, embedded system, real-time computing 1. Networks : Network architecture, network protocol, network components, network performance evaluation, network service 2. Security : Cryptography, security services, intrusion detection system, hardware security, network security, information security, application security 3. Software organization : Interpreter, Middleware, Virtual machine, Operating system, Software quality 4. Software notations and tools : Programming paradigm, Programming language, Domain-specific language, Modeling language, Software framework, Integrated development environment 5. Software development : Software development process, Requirements analysis, Software design, Software construction, Software deployment, Software maintenance, Programming team, Open-source model 6. Theory of computation : Model of computation, Computational complexity 7. Algorithms : Algorithm design, Analysis of algorithms 8. Mathematics of computing : Discrete mathematics, Mathematical software, Information theory 9. Information systems : Database management system, Information storage systems, Enterprise information system, Social information systems, Geographic information system, Decision support system, Process control system, Multimedia information system, Data mining, Digital library, Computing platform, Digital marketing, World Wide Web, Information retrieval Human-computer interaction, Interaction design, Social computing, Ubiquitous computing, Visualization, Accessibility 10. Concurrency : Concurrent computing, Parallel computing, Distributed computing 11. Artificial intelligence : Natural language processing, Knowledge representation and reasoning, Computer vision, Automated planning and scheduling, Search methodology, Control method, Philosophy of artificial intelligence, Distributed artificial intelligence 12. Machine learning : Supervised learning, Unsupervised learning, Reinforcement learning, Multi-task learning 13. Graphics : Animation, Rendering, Image manipulation, Graphics processing unit, Mixed reality, Virtual reality, Image compression, Solid modeling 14. Applied computing : E-commerce, Enterprise software, Electronic publishing, Cyberwarfare, Electronic voting, Video game, Word processing, Operations research, Educational technology, Document management.
Articles
962 Documents
OBJECT DETECTION OF INDONESIAN SIGN LANGUAGE SYSTEM USING YOLOV7 METHOD
Genta Kusuma Atmaja;
Hikmayanti, Hanny;
Rahmat, Rahmat;
Sutan Faisal
Jurnal Teknik Informatika (Jutif) Vol. 5 No. 4 (2024): JUTIF Volume 5, Number 4, August 2024
Publisher : Informatika, Universitas Jenderal Soedirman
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.52436/1.jutif.2024.5.4.2468
SIBI or Indonesian Sign Language System, a communication language for the deaf community in Indonesia. SIBI has the advantage of conveying information between individuals. SIBI integrates various hand signals to replace words in Indonesian, enabling effective and inclusive communication. SIBI still lacks educational programs in the community and identifying SIBI has become a major problem in facilitating communication for normal people with hearing impairments. The proposed solution in the development of SIBI detection is to utilize artificial intelligence (AI) technology and digital image processing. This program focuses on understanding the typical hand movements used in SIBI. So a program was created to detect hand language using the YOLOv7 architecture. This study aims to educate those who are not yet familiar with the SIBI hand object that will be detected., especially in the context of sign language recognition for singular pronouns. The research method used is data acquisition by collecting a dataset of 320 images, data annotation by labeling objects on the hand, image pre-processing with augmentation, resizing, and cropping, model training with 100 epochs on both pre-trained models (yolov7 and yolov7-x), and testing is done by detecting 20 images from each class category totaling 5. The dataset used for training 300 images and validation 20 images. The results of the yolov7 model accuracy value are mAP @ .5 of 99.5% and mAP @ .5: .95: of 90.5%. The accuracy of the yolov7-x model is mAP @ .5 99.6% and mAP @ .5: .95: of 75.8%. And the results of the test carried out with 20 images, out of 20 correct images only 18 and the accuracy value obtained is 90%.
STEMMING IN MADURESE LANGUAGE USING NAZIEF AND ADRIANI ALGORITHM
Moh Ashari;
Sulistyo, Danang Arbian;
Ahda, Fadhli Almu’iini
Jurnal Teknik Informatika (Jutif) Vol. 5 No. 4 (2024): JUTIF Volume 5, Number 4, August 2024 - SENIKO
Publisher : Informatika, Universitas Jenderal Soedirman
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.52436/1.jutif.2024.5.4.2012
Madurese is one of the regional languages in Indonesia, which dominates East Java and Madura Island in particular. However, the use of Madurese is declining compared to other regional languages. This is partly due to a sense of prestige and difficulty in learning it. As a result, the future of Madurese as one of the regional languages in Indonesia is increasingly threatened by the decline in its use. In addition, academic literature and scientific publications in Madurese are difficult to find in public and academic libraries, so previous research on Madurese stemming is still very little and needs to be developed further. Therefore, this research aims to find the base word of Madurese language using Nazief & Adriani algorithm based on Madurese language morphology. The Nazief & Adriani method in previous studies has good performance. Stemming can also be developed into a Madurese language translator application into other languages. This research uses 650 words in the form of datasets, consisting of 500 prefix words and 150 suffix words. The resulting accuracy for the whole is 96.61% with 628 correct words, the prefix has 95.6% accuracy, and the suffix has 100% accuracy. Overstemming was found in 22 prefix words and no words experienced Understemming.
ANALYSIS OF THE LAPAK HIJAU BUSINESS MODEL IN THE SALE OF FURNITURE GOODS THROUGH THE E-COMMERCE PLATFORM
Fakhriyyah , Alma Nisa;
Wiranata, Ade Davy
Jurnal Teknik Informatika (Jutif) Vol. 5 No. 4 (2024): JUTIF Volume 5, Number 4, August 2024 - SENIKO
Publisher : Informatika, Universitas Jenderal Soedirman
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.52436/1.jutif.2024.5.4.2034
The problems researched concern how Lapak Hijau can optimize its operations, increase customer accessibility, and maximize profits through the integration of second-hand furniture sales in an e-commerce environment including business model analysis in the context of second-hand furniture sales through an e-commerce platform. Lapak Hijau is a company engaged in buying used goods from various sources, including hotels, restaurants, and factories and reselling them at a higher price. This research aims to analyze Lapak Hijau's business model in the sale of used furniture through an e-commerce platform focusing on business model changes that allow integrating the sale of used furniture through an e-commerce platform. The research method combines business model analysis with a literature review on e-commerce and stock management to identify the optimal strategy for Lapak Hijau in integrating second-hand furniture sales in an e-commerce environment. The results of this research provide an in-depth insight into effective business strategies for Lapak Hijau in taking on the challenges and opportunities in the e-commerce era. The conclusion of this research will outline practical recommendations for Lapak Hijau and similar businesses in enhancing their success and growth in the digital environment.
ANALYSIS AND IMPLEMENTATION OF THE INTERNET OF THINGS (IoT) IN THE DEVELOPMENT OF MONITORING SOLAR POWER PLANTS (PLTS) 600 WP
Abdulghani, Tarmin;
Nazilah, Siti;
Legiawan, M. Kany;
Sulaeman, Fietri Setiawati;
Setiadi, Moch Fahmi
Jurnal Teknik Informatika (Jutif) Vol. 5 No. 4 (2024): JUTIF Volume 5, Number 4, August 2024 - SENIKO
Publisher : Informatika, Universitas Jenderal Soedirman
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.52436/1.jutif.2024.5.4.2093
Solar power plants are becoming an increasingly popular solution for providing clean and sustainable energy. However, careful monitoring is required to maximize their performance, and it is necessary to monitor the functioning of solar power plants devices. This study proposes developing an Internet of Things (IoT)-based monitoring system for solar power plants using the PPDIOO (Prepare, Plan, Design, Implement, Operate, Optimize) method. The Prepare stage involves identifying monitoring needs, while the Plan stage includes infrastructure planning and sensor selection. The Design stage focuses on the design of a monitoring system that suits the needs of PLTS. The implementation stage involves the installation and configuration of hardware and software. Afterward, the Operate stage ensures that the system is running properly, while the Optimize stage aims to improve the system's performance continuously. Through this approach, we strive to present a systematic and structured framework for developing solar farms with IoT monitoring systems.
IMAGE CLASSIFICATION OF HOUSEHOLD BENEFICIARIES OF DIRECT CASH ASSISTANCE USING EFFICIENTNET IN DKI JAKARTA PROVINCE
Adam, Dzikri;
Santoso, Hadi
Jurnal Teknik Informatika (Jutif) Vol. 5 No. 4 (2024): JUTIF Volume 5, Number 4, August 2024 - SENIKO
Publisher : Informatika, Universitas Jenderal Soedirman
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.52436/1.jutif.2024.5.4.2121
This study investigates the application of the EfficientNet architecture for image classification to determine eligible recipients of direct cash assistance among households in Jakarta Province. As government efforts to provide aid to citizens increase, it becomes essential to have a system that can accurately recognize and classify eligible populations. Misallocation of aid remains a prevalent issue, often leading to undeserving individuals receiving assistance, which has detrimental consequences. The primary focus is on leveraging deep learning, specifically EfficientNet, to address these challenges. The dataset used consists of house images categorized into two classes: "Mampu" and "Tidak Mampu," which were collected through personal photography and web scraping from Google. The research aims to develop an algorithm that accurately classifies and analyzes the types and eligibility of residential buildings within the general population. Data collection and processing challenges are addressed to ensure the training of high-quality, representative image datasets. The model has demonstrated a high accuracy rate of approximately 95.03% on the validation data.
OPTIMIZING NATURAL DISASTER LOCATIONS USING TEXT FILTERING WITH WEB-BASED JARO WINKLER ALGORITHM
Jatikusumo, Dwiki;
Hidayat, Rahmat Rian
Jurnal Teknik Informatika (Jutif) Vol. 5 No. 4 (2024): JUTIF Volume 5, Number 4, August 2024 - SENIKO
Publisher : Informatika, Universitas Jenderal Soedirman
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.52436/1.jutif.2024.5.4.2132
At the end of 2023, several natural disasters were felt, especially in the capital city, namely floods, and the earthquake did occur outside DKI Jakarta but the earthquake was felt. From this incident, it will be made to monitor and optimize the location of earthquakes and floods that occur based on the web. According to the government website, the earthquake also occurred, but there was no flooding. Based on the occurrence of several natural disasters, it is hoped that this research can provide information related to the location of floods, earthquakes, forest fires, and landslides in the region, especially in Indonesia. With the news website source, it is the source of data that will be processed. Furthermore, the percentage level of accuracy obtained by combining from text filtering and Jaro Winkler algorithm.
IMPLEMENTATION OF DATA ENCRYPTION IN AN IOT-BASED HEART RATE AND OXYGEN SATURATION BLOOD DETECTION TOOL USING THE ELGAMAL METHOD
Haryansyah, Haryansyah
Jurnal Teknik Informatika (Jutif) Vol. 5 No. 4 (2024): JUTIF Volume 5, Number 4, August 2024 - SENIKO
Publisher : Informatika, Universitas Jenderal Soedirman
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
One of the problems with Internet of Things (IoT) devices today is data security. Especially regarding IoT devices that function to read personal or confidential data such as health-related data. This research focuses on discussing data security techniques through the process of encrypting sensor data that reads heart rate and blood oxygen saturation from an IoT device. This data is quite personal and confidential data because it concerns a person's medical history. The encryption method that will be used is the Elgamal method. The Elgamal method is an asymmetric encryption method, meaning the key used for encryption is different from the key used for decryption. This elgamal method uses a public key for encryption and a private key for decryption. The research results show that implementing data encryption using the Elgamal method to secure data on IoT devices was successful. Data security can prevent misuse of data by unauthorized parties.
ANALYSIS AND REDESIGN OF SI TOYA WENING APPLICATION USING DESIGN THINKING METHOD
Alfian, Muhammad Ichsan;
Irsan, Muhamad;
Fathoni, Muhammad Faris
Jurnal Teknik Informatika (Jutif) Vol. 5 No. 4 (2024): JUTIF Volume 5, Number 4, August 2024 - SENIKO
Publisher : Informatika, Universitas Jenderal Soedirman
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.52436/1.jutif.2024.5.4.2140
Si Toya Wening application is an application designed to facilitate Surakarta PDAM customers in making water bill payments, making complaints, and other features. When research was conducted to 155 users, it showed that there were several indications of problems that usability in this application was not going well, such as a less intuitive interface, mismatch of items on the bottom navigation bar, and information blocked by other elements. In order to enhance the usability of this application, redesigning the interface is essential. As a measure of success, usability testing and system usability scale were used to compare the initial appearance and the appearance after being redesigned. The result of this research is a redesigned prototype with the design thinking method which is then tested using SUS to a sample of 83 respondents. SUS parameters are Acceptability ranges, adjective ratings, and grade scale. The final test results will be assessed in comparison to the initial test results. The test results show a significant improvement in application usability. The increase in the SUS score from 62.35 in the first test to 80.69 in the final test shows an improvement in usability. The acceptability range shifted from “MARGINAL LOW” to “ACCEPTABLE,” the adjective ratings improved from “OK” to “EXCELLENT,” and the grade scale rose from category “D” to “B.” This enhancement indicates that the application's usability has significantly improved.
PUBLIC SENTIMENT ANALYSIS ON ELECTRIC CARS USING MACHINE LEARNING ALGORITMS
Damaiarta Tejayanda, Rigger;
Prasetyo, Bayu;
Faisal, Muhamad Agus;
Abigael, Rakha;
Rohana, Tatang;
Sukmawati, Cici Emilia
Jurnal Teknik Informatika (Jutif) Vol. 5 No. 4 (2024): JUTIF Volume 5, Number 4, August 2024
Publisher : Informatika, Universitas Jenderal Soedirman
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.52436/1.jutif.2024.5.4.2141
The presence of electric vehicles has generated diverse opinions among the public, as widely discussed on social media. The lack of understanding about electric vehicle innovation can influence their perception. Issues such as infrastructure, high prices, pollution concerns, and adaptation to new technology present challenges for automotive companies in their innovation efforts. This study aims to analyze public sentiment towards electric vehicles through comments on the TikTok platform, which can serve as a reference for companies in evaluating and developing electric vehicle innovations. Six different classification algorithms were tested to determine the most effective and accurate one. The methods used include data collection of comments, pre-processing, data processing through stemming, tokenization, and stopwords removal techniques, as well as labeling and modeling stages. The results of the study show that Support Vector Machine are the most superior algorithms with the highest accuracy of 90%. This research provides new insights into public perception of electric cars and the effectiveness of various sentiment analysis algorithms in the context of social media.
NETWORK'S ACCESS LOG CLASSIFICATION FOR DETECTING SQL INJECTION ATTACKS WITH THE LSTM ALGORITHM
Hafriadi, Fajar Dzulnufrie;
Ardiansyah, Rizka
Jurnal Teknik Informatika (Jutif) Vol. 5 No. 4 (2024): JUTIF Volume 5, Number 4, August 2024 - SENIKO
Publisher : Informatika, Universitas Jenderal Soedirman
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.52436/1.jutif.2024.5.4.2157
SQL Injection attacks are one of the popular web attacks. This attack is a network security problem focused on the application layer which is one of the causes of a large number of user data leaks. Currently available SQL detection techniques mostly rely on manually created features. Generally, the detection results of SQL Injection attacks depend on the accuracy of feature extraction, so they cannot overcome increasingly complex SQL Injection attacks on various systems. Responding to these problems, this research proposes a SQL Injection attack detection method using the long short term memory (LSTM) algorithm. The LSTM algorithm can learn data characteristics effectively and has strong advantages in sorting data so that it can handle massive, high-dimensional data. The research results show that the accuracy of the model approach created is able to recognize objects with a high accuracy value of 98% in identifying SQL Injection attacks.